Abstract
In MANETs, secure communication is very difficult to achieve because its nature-like communication medium is open wireless which can be easily accessed by anyone who comes in the radio range of the communicating devices, nodes are physically vulnerable, less-efficient (processing power, memory) communicating devices, the absence of central authority, free from the constraint of topological structure of network, etc. In last decade, applications of MANETs are increasing rapidly. Most of the application demands the secure communication of information. In this work, symmetric key based authentication mechanism has been proposed to ensure the secure communication between the communicating parties. The proposed model secures the network from the well known and frequently occurred attacks (impersonation, modifies routing information, black hole). In this work, two levels of authentication have been used, first level for hop-to-hop authentication (MD5 algorithm has been used for authentication code generation) and second level for end-to-end authentication (SHA1 algorithm has for authentication code generation). For the simulation purpose, AODV protocol is used for checking the effectiveness of the proposed model and PDR; AE2ED and TP are used to measure the performance of the proposed, AODV and existing models in the absence and presence of the malicious nodes. NS2.35 on Ubuntu 12.04 LTS with 4 GB RAM is used for simulation. Simulation results show the advantage of proposed model over the original AODV and some related models published recently. A result showing our model implements the security scheme with less overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
N. Sharma, A Gupta, SS Rajput and V. Yadav, “ Congestion Control Technique in MANET: A Survey” 2nd IEEE International Conference on CICT, pp. 280–282, Feb. 2016.
S. S. Rajput, V. Kumar and S. K. Paul, “Comparative Analysis of Random Early Detection (RED) and Virtual Output Queue (VOQ) in Differential Service Networks” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.
S. S. Rajput, V. Kumar and K. Dubey, “Comparative Analysis of AODV and AODV-DOR routing protocol in MANET” International Journal of Computer Application, vol. 63, no. 22, pp. 19–24, Feb 2013.
D. Djenouri et al. “A survey of security issues in mobile ad hoc networks” IEEE Communications Surveys & Tutorials. Fourth Quarter 2005.
M. Charvalho, “Security in Mobile Ad hoc Networks” Published by the IEEE Computer S ociety, pp:72–75, 2008.
William Stalling, Cryptography and Network Security, 4th Ed. Pearson Education, India, 2006.
B. A. Forouzan, Cryptography and Network Security, 2nd Ed., Tata McGraw-Hill Higher Education, India, 2008.
K. V. Arya and S. S. Rajput, “Securing AODV routing protocol in MANET using NMAC with HBKS Technique,” IEEE International Conference on SPIN, pp. 281–285, Feb 2014.
P. Sachan and P. M. Khilar, “Securing AODV routing protocol in MANET based on cryptographic authentication mechanism,” International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 5, 2011.
S. S. Rajput and M. C. Trivedi, “Securing ZRP routing protocol in MANET using Authentication Technique,” IEEE International Conference on CICN, pp. 872–877, Nov. 2014.
E. H. T. Issariyakul, “Introduction to Network Simulator NS2,” Springer Science and Business Media, NY, USA, 2009.
C. Perkins, E. Beldingroyer, and S. Das, “AODV RFC 3561,” Internet Engineering Task Force (IETF), 2003. Available at http://datatracker.ietf.org/doc/rfc3561/.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte. Ltd.
About this paper
Cite this paper
Malhotra, S., Trivedi, M.C. (2018). Symmetric Key Based Authentication Mechanism for Secure Communication in MANETs. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Intelligent Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 19. Springer, Singapore. https://doi.org/10.1007/978-981-10-5523-2_16
Download citation
DOI: https://doi.org/10.1007/978-981-10-5523-2_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5522-5
Online ISBN: 978-981-10-5523-2
eBook Packages: EngineeringEngineering (R0)